Security is not guesswork

January 2016 Security Services & Risk Management

Unless you are able to sell ice to an Eskimo, there are not many people that make good salespeople. You need to know your product inside out, be confident and be able to convince the person in front of you that they really need to buy what you are selling; that they should have, in fact, purchased this ages ago.

To be that persuasive is often a rare talent on its own and this is why many people do not make it or stick to this type of career in the long run. The reality of the matter is that the turnover in the sales team – and this is relevant to many different industries, not just security – is actually very rapid and high. Usually within the first 3 to 6 months, whether by their own choice or that of management, and targets that are not made, many novices decide to move on. This is the cutting edge and a dog-eats-dog world. A few make it, but more do not.

The problem created due to this is that the salesman is not always as experienced or particularly knowledgeable about the full functionality of his product – both benefits and shortfalls. In this case, we are definitely looking at the security world and not the salesman at Verimark. Consider the following – although you may feel that the latest version of the mop is something you couldn’t imagine not owning before (how did I ever keep my floor clean before?), it does not mean life or death. But security does. Think about the importance and value of what we all in this industry actually do and the impact that we have; what a responsibility we really shoulder. Incorrect advice or solutions not properly thought through can have a tremendous impact and result in tragedy that could well have been prevented.

Listening and understanding

It needs to be understood that there are many dedicated salesmen in security that study, test and truly back their products and take pride in presenting you good solutions. We have had the pleasure on occasion with dealing with such individuals who really make an effort in creating an understanding what the capabilities of their products are and go the extra mile to assist us. This knowledge is then passed on to the end user via the in-depth security risk assessment. It is these companies that have taken the time, answered our questions and provided the relevant information as requested that make the sale at the end of the day. These are not the people that we are referring to. Let’s call these the experts. They will understand the additional value that the risk assessor will bring to his company’s table.

In this case, we are specifically looking at the novice who defines his inventory in terms of commission and a spec sheet that he has memorised, although he does not really understand the full functionality of his product at times. This salesman will tend to predetermine the solutions of a client prior to actually inspecting the site and usually this is done in terms of what he perceives the client to be able to comfortably afford. Many a time, we have encountered end users who are unhappy with a system they have recently installed because they feel the salesman simply didn’t listen to the scope and what they wanted. Should an inspection be conducted at the property, this is more of a product assessment that a full security risk assessment, as problems and their consequent solutions are only viewed in terms of the salesman’s inventory. He may choose not to inform the client of a security threat onsite because he does not have the necessary tools within his stock to remedy it.

Not guesswork

It needs to be understood that security is by no means guesswork. This is where the independently conducted security risk assessment becomes an extremely valuable tool. The first extensive phase of the assessment compromises of the actual investigation of the site. This includes not only the hardware, but various other facets that are intangible so as to identify all weaknesses within the physical security of the site. All this data is then audited and examined prior to the actual formulation of the workable options within the security plan.

At this point, the independent assessor actively researches the solutions and will consult with the experts from various supply, manufacture and installation companies. These experts will then advise the consultant as to which of their products, in terms of functionality, will remedy specific problem areas. The independent then carries this information over to the client in a complete security plan and the client then decides which items he is to purchase, upgrade or install. No commission or kickback is received by the independent risk consultant and the client contacts the expert directly to purchase his wares.

Everyone wins in this scenario. The client has received expert advice and the finest possible solutions for his specific security situation. Whether it is his home or his workplace, his property will be effectively secured and more resistant to crime. The expert has done his job well and given the assessor the best of his knowledge, which consequently results in a sale for his company. The consultant has ensured that his client’s scope has been achieved and his client is now in control of his security as he has a better understanding of his risk. Together, the independent and the expert have reached their joint goal in security and very possibly have made a huge difference for that particular client, namely that of life and death.

For more information contact Alwinco, +27 (0)74 222 0284, [email protected], www.alwinco.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Keeping safety central to enterprise risk management
Zulu Consulting Security Services & Risk Management
[Sponsored] As employee safety becomes an ever-more critical aspect of corporate risk management, Risk-IO assists risk managers in ensuring a safe working environment, whether in an industrial setting, an office, or anywhere.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Strategies for combating insider threats
Information Security Security Services & Risk Management
In Africa, insider threats pose an increasingly significant risk to businesses, driven by economic uncertainty, labour disputes, and rapid digital transformation. These threats can arise from various sources, including disgruntled employees and compromised third-party service providers

Read more...
World-first safe K9 training for drug detection
Technews Publishing SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Government and Parastatal (Industry)
The Braveheart Bio-Dog Academy recently announced the results of its scientific research into training dogs to accurately detect drugs and explosives without harming either the dogs or their handlers.

Read more...
New firearms training modules from ITA
News & Events Security Services & Risk Management
The International Firearm Training Academy has launched two new firearms training modules to support career development in the firearms industry: the Maintenance Fitter and the Firearms Custodian modules.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Background checks: risk levels and compliance
iFacts Access Control & Identity Management Security Services & Risk Management
Conducting background checks is a vital step in the hiring process for employers or when engaging service providers; however, it is crucial to understand the legal framework and regulations governing these checks.

Read more...
On the ball or unaware
Technews Publishing Information Security Security Services & Risk Management
Whether an organisation is operating at a high level of information security maturity or has dangerous vulnerabilities that could put an entire business at risk, advanced, strategic penetration testing can uncover its true state of IT security.

Read more...
The bane of burnout
Editor's Choice Security Services & Risk Management
The World Economic Forum has recently formally acknowledged burnout as an occupational syndrome, giving it a status that is even more worthy of being taken seriously and resolved as quickly as possible.

Read more...
A winning combination for modern cybersecurity
Information Security Security Services & Risk Management
Companies are compelled to comply with legislative mandates and, more importantly, implement appropriate security measures for their customers and their most valuable asset – their data.

Read more...